Sciweavers

631 search results - page 102 / 127
» Location-aware key establishment in wireless sensor networks
Sort
View
GLOBECOM
2007
IEEE
15 years 3 months ago
On the Design of Future Wireless Ad Hoc Networks
— In this paper, we study the design of future wireless ad hoc networks. Particularly, we consider that the future wireless ad hoc networks shall be able to efficiently provide ...
Kejie Lu, Shengli Fu, Tao Zhang, Yi Qian
AI50
2006
15 years 1 months ago
Adaptive Multi-modal Sensors
Compressing real-time input through bandwidth constrained connections has been studied within robotics, wireless sensor networks, and image processing. When there are bandwidth con...
Kyle Ira Harrington, Hava T. Siegelmann
TMC
2012
12 years 12 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
EWSN
2006
Springer
15 years 9 months ago
On the Scalability of Routing Integrated Time Synchronization
Time synchronization is a crucial component of a large class of sensor network applications, traditionally implemented as a standalone middleware service that provides a virtual gl...
János Sallai, Branislav Kusy, Ákos L...
EWSN
2008
Springer
15 years 9 months ago
NanoECC: Testing the Limits of Elliptic Curve Cryptography in Sensor Networks
Abstract. By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibili...
Piotr Szczechowiak, Leonardo B. Oliveira, Michael ...